This document provides information for an introductory Splunk security workshop, including:
- Details about the workshop agenda, which covers basic posture and monitoring in the first section and an introduction to investigation in the second section.
- Instructions for accessing the workshop environment and materials.
- A legend explaining the visual guides that will be used during the hands-on portions of the workshop.
- Overviews of the four key data sources - endpoint, identity, network, and threat intelligence - that will be analyzed to improve security posture and monitoring.